Analysis
-
max time kernel
101s -
max time network
105s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
20-08-2024 16:29
Static task
static1
Behavioral task
behavioral1
Sample
aff848155fb6090388d6147ff867474b_JaffaCakes118.docm
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
aff848155fb6090388d6147ff867474b_JaffaCakes118.docm
Resource
win10v2004-20240802-en
General
-
Target
aff848155fb6090388d6147ff867474b_JaffaCakes118.docm
-
Size
382KB
-
MD5
aff848155fb6090388d6147ff867474b
-
SHA1
959294a546532204cad345d2f88673fade6ce4b0
-
SHA256
3962307b2873339db9a9965c682a5c1451965434765043e347ab688eaebe3f06
-
SHA512
56656844ca4697564a0ee6a80a15ad32f6aaab5a5373e4f6e98d874cc00be4dfc6ac9795488f22dd6bc6adbb924b5b3c3c044b8be4e74808ce38ca235f1cb793
-
SSDEEP
6144:d/2GQYO2wfyqUBDD5LpUuTSVbkecVQYP3yil1s8HsDsXAYeTkpoCz7Jcr:d+RaqUBDDppUugqiYKaBYs1pok7ir
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINWORD.EXE -
Office loads VBA resources, possible macro or embedded object present
-
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Temp\http:\bit.ly\1_loadingH7TvJa WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2544 WINWORD.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeShutdownPrivilege 2544 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2544 WINWORD.EXE 2544 WINWORD.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2544 wrote to memory of 2016 2544 WINWORD.EXE 32 PID 2544 wrote to memory of 2016 2544 WINWORD.EXE 32 PID 2544 wrote to memory of 2016 2544 WINWORD.EXE 32 PID 2544 wrote to memory of 2016 2544 WINWORD.EXE 32
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\aff848155fb6090388d6147ff867474b_JaffaCakes118.docm"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- NTFS ADS
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:2016
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-{4415EDDA-43A3-4739-86B0-897BFE68B6D3}.FSD
Filesize128KB
MD52c10355ac45742bc10cd0b1f36bb71d9
SHA12d2c6ce0a9a2443b887711372e297cec13fb9353
SHA256d9da4255dddfe740190f1c6b100176d55aed6c0fd71f75fd63d1be7010ebcd1c
SHA512798cce59bca8fb973e64cf1caf5be6afaab39404016843245c70a3cb088600eb76f2d63d1f999631a60c6bb128a2e5d8a65cd0e0904d2be6047c88988aefafc2
-
C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD
Filesize128KB
MD55f3419071e2e283b3a567eb41242c0b5
SHA1eb8e3d5844da038851c363b1cd4faa5e495c1ddc
SHA256d1bd9717893ab48ccdf85d2b0cf313b9fdadb7a8c51d378eba7937dff4216d5a
SHA51274a599cbe1d1244d781d258ccc974b437e5f760ce86e8d16dfc7111b3ab0c6560b3dd3b0f66064a36da67a91d61c44eaf144d4fd7f0a4d7e7b0fe7495c47d2d7
-
C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-{139CBD30-E045-429B-A296-E8897D107876}.FSD
Filesize128KB
MD589aceb8f18e92b4c9e3a67cee95006b8
SHA1636ac66a46128459a145f0ea8410d6846af138fa
SHA2561c09fe4071edd8da71c3905e4474227ff215226f89f494e2efcd1ac0721efa13
SHA512917b801d5874bbd95ecf7c23c4e85031e56e460013b140a4be60716d001c7f4e0ee72ec97c1a312aa81cde4e39ad1e5cf3429cccb8e77ebb7bf3aca31597ccdc
-
Filesize
39KB
MD5c2485d9ae8e561a192571bc6a1285725
SHA15547d74bc1ef2ddc668398f07ca34d6b6ad2393c
SHA2565c3e2dd465a682f147a42238021c54ca029774971f6738d680443af925381166
SHA512be629b38d008fd7abb6285797dcf6164df09a4f3fd43449f8b49e9bcf9c9270f4795f6fc00b43fe074418099d0a1a7b90d576c9b5d628b8191c8bfcf5cebba2c
-
Filesize
128KB
MD583dc1b7eab09eb0fdf06250aadc10932
SHA1f8dcb5241cb8bdd4fbb6498e2ea7af4bd019f72f
SHA25630585ab71f00fe9e7872cf47dcfd39699938fe4796064149975e5f9c7106ce84
SHA512ae6ce30872a250d8e6214a9bdb435df87311bb5a261e5fb7869807509026dca9353674261b95ba79cd6c509303711ae0ffe5a7e4d459c371daf2f986e9c7c011
-
Filesize
19KB
MD577139e07915712025cb21eac8f050cae
SHA19ed6950cfe27f64f25aabead2c60188c980374e9
SHA2565acf3d2982c1614edb383c823bcfef61a636b753da9439160130280450cb7f6b
SHA5122463d6ab06d5242dcdb6c3318cb6c63b47a11ffd6c0b840fe3604cf609edc277c57b894dcc7205722db90969acfae71cce38db43e469148519806f11288c3c29